Banner object (1)

5307 policies in database
  Back Link to program      
Localize logo
Hall of Fame



No technology is perfect, and Localize believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security bug in the services listed in our scope, we will be happy to work with you to resolve the issue promptly and ensure you are fairly rewarded for your discovery.

Disclosure Policy

  • Let us know as soon as possible upon discovery of a potential security issue or vulnerability, and we'll make every effort to quickly resolve the issue.
  • Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party.
  • Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder.


While researching, we'd like to ask you to refrain from testing against our production environment. Instead, please test against our staging environment: __

Reports related to the following are also not eligible for reward:

  • DDoS and DoS
  • Request flooding
  • Rate limit bypass
  • Token leakage to 3rd party
  • Enabling 2FA without email confirmation
  • Reflected XSS (stored XSS reports are welcomed)
  • DMARC / SPF / Email spoofing
  • Do not test the FreshChat Chat Widget (external service, out of scope)
  • Do not test the Help Center, (external service, out of scope)
  • "Weak password" or "Password policy" issues

IMPORTANT: This program will not pay bounties on reports that do not pose a security risk to the application. (For example, we will not award bounties for application bugs, UNLESS the bug can be exploited to compromise account security or result in inappropriate data disclosure)


You will qualify for a reward only if you are the first person to responsibly disclose an unknown issue. The Localize security team has 30 days to respond to the report, and up to 90 days to implement a fix base on the severity of the report.

Please allow for this process to fully complete before attempting to contact us again. Note that posting details or conversations about the report or posting details that reflect negatively on the program and the Localize brand, will result in immediate removal from the program.

  • Any vulnerability found must be reported no later than 24 hours after discovery.
  • You are not allowed to disclose details about the vulnerability anywhere else.
  • You must avoid tests that could cause degradation or interruption of our production service.
  • You must only test against non-production endpoints: __and __


Localize may provide rewards to eligible reporters of qualifying vulnerabilities. Our minimum reward is $50 USD, and our maximum rewards is $1,000 USD. Reward amounts may vary depending upon the severity of the vulnerability reported.

The following table outlines the average rewards for specific classes of vulnerabilities:

  • Remote Shell / Command Execution: $1,000
  • Significant Authentication Bypass: $500
  • Application Permissions Bypass $200
  • Local file Inclusion $200
  • SQL Injection $200
  • Insecure Direct Object References $200
  • Server Side Request Forgery $150
  • CSRF (site wide) $100
  • XSS $50

Reports that include information about how the vulnerability can be exploited in the wild will receive higher reward amounts than vulnerabilities with low likelihood of exploitation.

To qualify for a reward under this program, you should:

  1. Be the first to report a vulnerability.
  2. Send a clear textual description of the report along with steps to reproduce the vulnerability.
  3. Include attachments such as screenshots or proof of concept code as necessary.
  4. Disclose the vulnerability report directly and exclusively to us.

A good bug report should include the following information at a minimum:

  • List the URL and any affected parameters
  • Describe the browser, OS, and/or app version
  • Describe the perceived impact. How could the bug potentially be exploited?

Exceptions & Rules

Our bug bounty program is limited strictly to technical security vulnerabilities of Localize services, within Localize's Staging environment, listed in the scope. Any activity that would disrupt, damage or adversely affect any third-party data or account is not allowed. Please see the "Exclusions" section above for issues that will not be considered.

In Scope

Scope Type Scope Name

web_application __


web_application __

web_application __

web_application __


web_application __


This program have been found on Hackerone on 2020-01-25.

FireBounty © 2015-2020

Legal notices